New BPFDoor variants hide deeper in telecom networks with stateless C2 and ICMP relays


BPFDoor has returned with new tricks that make an already stealthy Linux backdoor even harder to spot. Rapid7 says the latest variants use stateless command routing and ICMP relay to keep command traffic flexible, avoid fixed infrastructure, and blend into trusted network activity inside telecom environments.

The short answer is yes, this is a serious escalation. According to Rapid7 Labs, researchers analyzed nearly 300 samples and identified seven new BPFDoor variants, with two primary families named httpShell and icmpShell. The company says these versions improve operational security and help attackers maintain near-undetectable persistence in global telecommunications infrastructure.

What makes BPFDoor different is how it waits. Instead of opening a normal listening port, the malware abuses Berkeley Packet Filter functionality in Linux to inspect traffic inside the kernel and wake up only when it receives a specially crafted trigger packet. That design leaves far fewer obvious signs for defenders to catch with traditional scans.

Why these new variants matter

Rapid7 links the broader campaign to a China-nexus threat actor known as Red Menshen and says the activity fits a long-term espionage model, not a quick smash-and-grab intrusion. In its March 26 report, the company said the group had embedded covert access inside telecom infrastructure with the apparent goal of supporting intelligence collection, including against government networks.

ICMP Relay Using the HIP Field (Source – Rapid7)

The newer samples push that tradecraft further. Rapid7 says the updated BPFDoor code introduces stateless C2 routing through a magic packet structure that includes a Hidden IP, or HIP, field. When the malware sees a special -1 flag, represented as 255.255.255.255, it can ignore a hardcoded controller address and instead send its reverse shell to the source IP contained in the triggering packet.

That change matters because it removes a fixed destination defenders might track or block. Rapid7 says this gives operators more freedom to work behind NAT or VPN infrastructure without exposing a stable command-and-control endpoint in the payload itself.

How the ICMP relay helps attackers stay hidden

Rapid7 also says both major variants support ICMP relay. In practice, that means an infected system can forward crafted ICMP Echo Request traffic toward an internal target using the HIP field, turning the compromised machine into a quiet relay node inside the network. For defenders, that raises the risk that ordinary-looking ping traffic could help move commands deeper into internal segments.

Creation of 3 Sockets Handling TCP, UDP, and ICMP (Source – Rapid7)

The company adds that these variants can open parallel sockets for TCP, UDP, and ICMP traffic, which gives the malware fallback options if one path gets blocked. That multi-channel design improves resilience and makes containment harder during live response.

Rapid7’s reporting also shows the malware trying to look like a normal service. Researchers describe process name spoofing, on-disk persistence in newer samples, and anti-forensic behavior such as timestomping and wiping file descriptors. Together, those steps reduce noise and help the implant stay buried for longer.

Timestomping and Full FDs Wipe (Source – Rapid7)

What security teams should watch for

Here is a quick view of the main changes security teams should care about:

FeatureWhat Rapid7 observedWhy it matters
Kernel-level packet inspectionBPFDoor inspects traffic through BPF and waits for a magic packetNo obvious listening port, fewer traditional indicators
Stateless C2 routing-1 flag lets the malware reply to the source IP in the trigger packetRemoves the need for a fixed controller address
ICMP relayInfected hosts can forward crafted ICMP packets toward internal targetsCan hide command routing inside allowed network traffic
Multi-channel socketsSamples use TCP, UDP, and ICMP pathsGives attackers fallback communications options
Process disguise and anti-forensicsMasquerading, timestomping, and FD wipingMakes host-based detection and triage harder

Defenders should review Linux systems that sit close to core networking, telecom signaling, or containerized infrastructure first. Rapid7 says modern variants may no longer rely on older /dev/shm behavior, so teams should not limit hunts to fileless patterns alone.

Practical hunting steps include:

  • Monitor for suspicious raw socket activity on Linux hosts.
  • Inspect unusual internal ICMP traffic, especially traffic that does not fit normal diagnostics patterns.
  • Audit process names that mimic legitimate services but do not match expected binaries or paths.
  • Review active BPF filters on sensitive systems. Linux kernel documentation confirms BPF attaches packet filters at the socket and kernel level, which explains why this technique gives attackers a low-visibility trigger path.
  • Use Rapid7’s published detection materials, including its BPFDoor check script and IOCs repository.

FAQ

What is BPFDoor?

BPFDoor is a Linux backdoor that abuses Berkeley Packet Filter functionality to inspect incoming traffic in the kernel and activate only when it receives a specially crafted trigger packet.

Why are the new variants harder to detect?

Rapid7 says the new variants add stateless C2 routing, ICMP relay, process masquerading, and anti-forensic behavior. Those features reduce obvious network indicators and make host artifacts harder to spot.

Who is linked to this activity?

Rapid7 attributes the wider telecom-focused campaign to Red Menshen, which it describes as a China-nexus threat actor involved in long-term espionage activity.

Why do telecom networks matter so much here?

Rapid7 says telecom environments carry sensitive government and commercial communications and rely on specialized protocols and core infrastructure that offer valuable long-term access for espionage operations.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages